Security Vulnerability Response Information
Wind River® strives to deliver secure and reliable products. But with ever-increasing numbers of interconnected IoT devices, software vulnerabilities have become more widespread than ever.
These vulnerabilities may occur in Wind River–developed products or in execution environments in which Wind River products operate. Wind River is committed to active threat monitoring, rapid assessment and threat prioritization, proactive customer notification, and timely remediation.
Choose from the following common security vulnerabilities to get information about their remediation.
- Wind River Security Vulnerability Notice: TCP/IP Network Stack (IPnet, Urgent/11)
- Wind River Security Vulnerability Notice: Microarchitectural Data Sampling (MDS)
- Wind River Security Vulnerability Notice: CVE-2018-8897
- Wind River Security Vulnerability Notice: Meltdown and Spectre
- Wind River Security Vulnerability Notice: KRACK
- Wind River Security Vulnerability Notice: Stack Clash
- Wind River Security Vulnerability Notice: Dirty COW
- Wind River Security Vulnerability Notice: SSLv2 Protocol
- Wind River Heartbleed Vulnerability Security Notice
- Wind River Vulnerability Security Notice: CVE-2015-7547
- Wind River Vulnerability Security Notice: Cachebleed
- Wind River Vulnerability Security Notice: OpenSSL Issues
- Wind River Shellshock Vulnerability Security Notice: Shellshock
For further research, check out other reported vulnerabilities in our common vulnerabilities database.
